{"id":"USN-4223-1","summary":"openjdk-8, openjdk-lts vulnerabilities","details":"Jan Jancar, Petr Svenda, and Vladimir Sedlacek discovered that a side-\nchannel vulnerability existed in the ECDSA implementation in OpenJDK. An\nAttacker could use this to expose sensitive information. (CVE-2019-2894)\n\nIt was discovered that the Socket implementation in OpenJDK did not\nproperly restrict the creation of subclasses with a custom Socket\nimplementation. An attacker could use this to specially create a Java class\nthat could possibly bypass Java sandbox restrictions. (CVE-2019-2945)\n\nRob Hamm discovered that the Kerberos implementation in OpenJDK did not\nproperly handle proxy credentials. An attacker could possibly use this to\nimpersonate another user. (CVE-2019-2949)\n\nIt was discovered that a NULL pointer dereference existed in the font\nhandling implementation in OpenJDK. An attacker could use this to cause a\ndenial of service (application crash). (CVE-2019-2962)\n\nIt was discovered that the Concurrency subsystem in OpenJDK did not\nproperly bound stack consumption when compiling regular expressions. An\nattacker could use this to cause a denial of service (application crash).\n(CVE-2019-2964)\n\nIt was discovered that the JAXP subsystem in OpenJDK did not properly\nhandle XPath expressions in some situations. An attacker could use this to\ncause a denial of service (application crash). (CVE-2019-2973,\nCVE-2019-2981)\n\nIt was discovered that the Nashorn JavaScript subcomponent in OpenJDK did\nnot properly handle regular expressions in some situations. An attacker\ncould use this to cause a denial of service (application crash).\n(CVE-2019-2975)\n\nIt was discovered that the String class in OpenJDK contained an out-of-\nbounds access vulnerability. An attacker could use this to cause a denial\nof service (application crash) or possibly expose sensitive information.\nThis issue only affected OpenJDK 11 in Ubuntu 18.04 LTS, Ubuntu 19.04,\nand Ubuntu 19.10. (CVE-2019-2977)\n\nIt was discovered that the Jar URL handler in OpenJDK did not properly\nhandled nested Jar URLs in some situations. An attacker could use this to\ncause a denial of service (application crash). (CVE-2019-2978)\n\nIt was discovered that the Serialization component of OpenJDK did not\nproperly handle deserialization of certain object attributes. An attacker\ncould use this to cause a denial of service (application crash).\n(CVE-2019-2983)\n\nIt was discovered that the FreetypeFontScaler class in OpenJDK did not\nproperly validate dimensions of glyph bitmap images read from font files.\nAn attacker could specially craft a font file that could cause a denial of\nservice (application crash). (CVE-2019-2987)\n\nIt was discovered that a buffer overflow existed in the SunGraphics2D class\nin OpenJDK. An attacker could possibly use this to cause a denial of\nservice (excessive memory consumption or application crash).\n(CVE-2019-2988)\n\nIt was discovered that the Networking component in OpenJDK did not properly\nhandle certain responses from HTTP proxies. An attacker controlling a\nmalicious HTTP proxy could possibly use this to inject content into a\nproxied HTTP connection. (CVE-2019-2989)\n\nIt was discovered that the font handling implementation in OpenJDK did not\nproperly validate TrueType font files in some situations. An attacker could\nspecially craft a font file that could cause a denial of service (excessive\nmemory consumption). (CVE-2019-2992)\n\nIt was discovered that the JavaDoc generator in OpenJDK did not properly\nfilter out some HTML elements properly, including documentation comments in\nJava source code. An attacker could possibly use this to craft a Cross-Site\nScripting attack. (CVE-2019-2999)\n","modified":"2026-02-10T04:41:43Z","published":"2019-12-17T23:14:32Z","related":["UBUNTU-CVE-2019-2894","UBUNTU-CVE-2019-2945","UBUNTU-CVE-2019-2949","UBUNTU-CVE-2019-2962","UBUNTU-CVE-2019-2964","UBUNTU-CVE-2019-2973","UBUNTU-CVE-2019-2975","UBUNTU-CVE-2019-2977","UBUNTU-CVE-2019-2978","UBUNTU-CVE-2019-2981","UBUNTU-CVE-2019-2983","UBUNTU-CVE-2019-2987","UBUNTU-CVE-2019-2988","UBUNTU-CVE-2019-2989","UBUNTU-CVE-2019-2992","UBUNTU-CVE-2019-2999"],"upstream":["CVE-2019-2894","CVE-2019-2945","CVE-2019-2949","CVE-2019-2962","CVE-2019-2964","CVE-2019-2973","CVE-2019-2975","CVE-2019-2977","CVE-2019-2978","CVE-2019-2981","CVE-2019-2983","CVE-2019-2987","CVE-2019-2988","CVE-2019-2989","CVE-2019-2992","CVE-2019-2999","UBUNTU-CVE-2019-2894","UBUNTU-CVE-2019-2945","UBUNTU-CVE-2019-2949","UBUNTU-CVE-2019-2962","UBUNTU-CVE-2019-2964","UBUNTU-CVE-2019-2973","UBUNTU-CVE-2019-2975","UBUNTU-CVE-2019-2977","UBUNTU-CVE-2019-2978","UBUNTU-CVE-2019-2981","UBUNTU-CVE-2019-2983","UBUNTU-CVE-2019-2987","UBUNTU-CVE-2019-2988","UBUNTU-CVE-2019-2989","UBUNTU-CVE-2019-2992","UBUNTU-CVE-2019-2999"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4223-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-2894"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-2945"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-2949"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-2962"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-2964"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-2973"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-2975"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-2977"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-2978"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-2981"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-2983"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-2987"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-2988"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-2989"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-2992"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-2999"}],"affected":[{"package":{"name":"openjdk-8","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/openjdk-8@8u232-b09-0ubuntu1~16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8u232-b09-0ubuntu1~16.04.1"}]}],"versions":["8u66-b01-5","8u72-b05-1ubuntu1","8u72-b05-5","8u72-b05-6","8u72-b15-1","8u72-b15-2ubuntu1","8u72-b15-2ubuntu3","8u72-b15-3ubuntu1","8u77-b03-1ubuntu2","8u77-b03-3ubuntu1","8u77-b03-3ubuntu2","8u77-b03-3ubuntu3","8u91-b14-0ubuntu4~16.04.1","8u91-b14-3ubuntu1~16.04.1","8u111-b14-2ubuntu0.16.04.2","8u121-b13-0ubuntu1.16.04.2","8u131-b11-0ubuntu1.16.04.2","8u131-b11-2ubuntu1.16.04.2","8u131-b11-2ubuntu1.16.04.3","8u151-b12-0ubuntu0.16.04.2","8u162-b12-0ubuntu0.16.04.2","8u171-b11-0ubuntu0.16.04.1","8u181-b13-0ubuntu0.16.04.1","8u181-b13-1ubuntu0.16.04.1","8u191-b12-0ubuntu0.16.04.1","8u191-b12-2ubuntu0.16.04.1","8u212-b03-0ubuntu1.16.04.1","8u222-b10-1ubuntu1~16.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"8u232-b09-0ubuntu1~16.04.1","binary_name":"openjdk-8-demo"},{"binary_version":"8u232-b09-0ubuntu1~16.04.1","binary_name":"openjdk-8-jdk"},{"binary_version":"8u232-b09-0ubuntu1~16.04.1","binary_name":"openjdk-8-jdk-headless"},{"binary_version":"8u232-b09-0ubuntu1~16.04.1","binary_name":"openjdk-8-jre"},{"binary_version":"8u232-b09-0ubuntu1~16.04.1","binary_name":"openjdk-8-jre-headless"},{"binary_version":"8u232-b09-0ubuntu1~16.04.1","binary_name":"openjdk-8-jre-jamvm"},{"binary_version":"8u232-b09-0ubuntu1~16.04.1","binary_name":"openjdk-8-jre-zero"},{"binary_version":"8u232-b09-0ubuntu1~16.04.1","binary_name":"openjdk-8-source"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4223-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2894"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2945"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2949"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2962"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2964"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2973"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2975"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2978"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2981"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2983"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2987"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2988"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2989"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2992"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2999"}],"ecosystem":"Ubuntu:16.04:LTS"}}},{"package":{"name":"openjdk-lts","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/openjdk-lts@11.0.5+10-0ubuntu1.1~18.04?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"11.0.5+10-0ubuntu1.1~18.04"}]}],"versions":["9.0.4+12-2ubuntu4","9.0.4+12-4ubuntu1","10~46-4ubuntu1","10~46-5ubuntu1","10.0.1+10-1ubuntu2","10.0.1+10-3ubuntu1","10.0.2+13-1ubuntu0.18.04.1","10.0.2+13-1ubuntu0.18.04.2","10.0.2+13-1ubuntu0.18.04.3","10.0.2+13-1ubuntu0.18.04.4","11.0.2+9-3ubuntu1~18.04.3","11.0.3+7-1ubuntu2~18.04.1","11.0.4+11-1ubuntu2~18.04.3"],"ecosystem_specific":{"binaries":[{"binary_version":"11.0.5+10-0ubuntu1.1~18.04","binary_name":"openjdk-11-demo"},{"binary_version":"11.0.5+10-0ubuntu1.1~18.04","binary_name":"openjdk-11-jdk"},{"binary_version":"11.0.5+10-0ubuntu1.1~18.04","binary_name":"openjdk-11-jdk-headless"},{"binary_version":"11.0.5+10-0ubuntu1.1~18.04","binary_name":"openjdk-11-jre"},{"binary_version":"11.0.5+10-0ubuntu1.1~18.04","binary_name":"openjdk-11-jre-headless"},{"binary_version":"11.0.5+10-0ubuntu1.1~18.04","binary_name":"openjdk-11-jre-zero"},{"binary_version":"11.0.5+10-0ubuntu1.1~18.04","binary_name":"openjdk-11-source"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4223-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2894"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2945"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2949"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2962"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2964"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2973"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2975"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2977"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2978"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2981"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2983"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2987"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2988"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2989"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2992"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2999"}],"ecosystem":"Ubuntu:18.04:LTS"}}}],"schema_version":"1.7.3"}